Forum Discussion
F5 ASM/AWAF Remote File Inclusion signatures do not block http:// or https:// in the form parameter
- Jul 27, 2023
I tested this on other vendors and it is the same as the info I got is that there are no default signatures for this RFI attack as it will cause many issues an false positives, so you need to make a custom signature/irule to block this for the specific vunrable parameter.
Outside of that for XC Distributed Cloud the Service policy rules seem the way to go for configuring something like signatures:
Yes, maybe I am doing the test wrong, still another big issue is that Nginx App Protect also has the option for custom signatures (Configuration | NGINX Ingress Controller) but for now XC Distributed cloud does not and even with all signatures enabled and not in staging the RFI attack is not blocked on XC.
As a test backend with metasploitable 3 you can exploit this vunrability as seen in your picture with the query "page" parameter.
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
